Show simple item record

dc.contributor.authorDas Chowdhury, P.
dc.contributor.authorMalcolm, J.
dc.contributor.authorChristianson, B.
dc.date.accessioned2009-04-07T08:18:01Z
dc.date.available2009-04-07T08:18:01Z
dc.date.issued2006
dc.identifier.citationDas Chowdhury , P , Malcolm , J & Christianson , B 2006 , ' Anonymous authentication ' , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , no. Security Protocols , pp. 299-305 . https://doi.org/10.1007/11861386_36
dc.identifier.issn0302-9743
dc.identifier.otherPURE: 88083
dc.identifier.otherPURE UUID: fd9602df-1002-41d3-b8e2-a0192e83d428
dc.identifier.otherdspace: 2299/3139
dc.identifier.urihttp://hdl.handle.net/2299/3139
dc.description“The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of this article is not available in the UHRA]
dc.description.abstractThe contribution of this paper is a mechanism which links authentication to audit using weak identities and takes identity out of the trust management envelope. Although our protocol supports weaker versions of anonymity it is still useful even if anonymity is not required, due to the ability to reduce trust assumptions which it provides. We illustrate the protocol with an example of authorization in a role based access mechanism.en
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.titleAnonymous authenticationen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.description.statusPeer reviewed
rioxxterms.versionofrecordhttps://doi.org/10.1007/11861386_36
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record